Intrusion Detection Patents (Class 726/23)
  • Patent number: 11687659
    Abstract: A computer-implemented method, computer program product and computing system for: obtaining hardware performance information concerning hardware deployed within a computing platform; obtaining platform performance information concerning the operation of the computing platform; obtaining application performance information concerning one or more applications deployed within the computing platform; and generating a holistic platform report concerning the computing platform based, at least in part, upon the hardware performance information, the platform performance information and the application performance information.
    Type: Grant
    Filed: June 24, 2022
    Date of Patent: June 27, 2023
    Assignee: ReliaQuest Holdings, LLC
    Inventors: Brian P. Murphy, Joe Partlow, Colin O'Connor, Jason Pfeiffer
  • Patent number: 11689568
    Abstract: In several aspects of the present invention, a processor receives, from a rule-based intrusion detection system, an intercepted request sent by a hacker. A processor analyzes the intercepted request to determine, in part, a type of service and a type of hacker. A processor builds a first layer of a honeypot maze based on the analyzed intercepted request. A processor simulates the first layer of the honeypot maze to the hacker. A processor iteratively builds additional layers of the honeypot maze based on additional intercepted requests from the hacker.
    Type: Grant
    Filed: May 8, 2020
    Date of Patent: June 27, 2023
    Assignee: International Business Machines Corporation
    Inventors: Francesco Maria Carteri, Roberto Ragusa
  • Patent number: 11681802
    Abstract: This disclosure and the exemplary embodiments described herein, provide methods and systems for detecting a ransomware infection in one or more files. According to an exemplary embodiment, a low frequency encryption analysis and a high frequency encryption analysis of a plurality of received files is performed to determine if the one or more of the files are encrypted. If a file is encrypted, a watcher is utilized to monitor file events associated with the files for determining if one or more of the files are infected with ransomware.
    Type: Grant
    Filed: April 23, 2021
    Date of Patent: June 20, 2023
    Assignee: DATTO, INC.
    Inventor: Kurt Hansen
  • Patent number: 11681549
    Abstract: In an example embodiment, a new solution is provided for an in-memory database provided in a cloud as a service that enables “job cross running” instead of “parallel job running.” Specifically, job scripts are clustered based on a shared service. A primary job script in the cluster is compiled and executed, but secondary job scripts in the cluster are not compiled until after the execution of the primary job script has begun. A mock library is inserted into each of the secondary job scripts to cause service calls for the shared service in the secondary job scripts to be replaced with mock service calls. The secondary job scripts are then scheduled and executed, and upon completion the primary job script is permitted to delete the shared service.
    Type: Grant
    Filed: April 28, 2022
    Date of Patent: June 20, 2023
    Assignee: SAP SE
    Inventors: Long Du, Le Zhang, Yu Wang
  • Patent number: 11683326
    Abstract: A method and system for detecting and preventing Internet fraud in online transactions by utilizing and analyzing a number of parameters to uniquely identify a computer user and potential fraudulent transaction through predictive modeling. The method and system uses a delta of time between the clock of the computer used by the actual fraudulent use and the potentially fraudulent user and the clock of the server computer in conjunction with personal information and/or non-personal information, preferably the Browser ID.
    Type: Grant
    Filed: March 22, 2021
    Date of Patent: June 20, 2023
    Assignee: The 41st Parameter, Inc.
    Inventor: Ori Eisen
  • Patent number: 11681800
    Abstract: A system for conducting a security recognition task, the system comprising a memory configured to store a model and training data including auxiliary information that will not be available as input to the model when the model is used as a security recognition task model for the security recognition task. The system further comprising one or more processors communicably linked to the memory and comprising a training unit and a prediction unit. The training unit is configured to receive the training data and the model from the memory and subsequently provide the training data to the model, and train the model, as the security recognition task model, using the training data to predict the auxiliary information as well as perform the security recognition task, thereby improving performance of the security recognition task. The prediction unit is configured to use the security recognition task model output to perform the security recognition task while ignoring the auxiliary attributes in the model output.
    Type: Grant
    Filed: August 13, 2021
    Date of Patent: June 20, 2023
    Assignee: Sophos Limited
    Inventors: Richard Edward Harang, Ethan McAvoy Rudd, Konstantin Berlin, Cody Marie Wild, Felipe Nicolás Ducau
  • Patent number: 11677765
    Abstract: Provided herein are identification of a distributed denial of service attack and automatic implementation of preventive measures to halt the distributed denial of service attack. At substantially the same time as the attack, valid users/customers (e.g., devices) are provided quality of service and continued access to a website experiencing the distributed denial of service attack. Further, service to temporary or unknown users (e.g., devices) with public access to the website is suspended during the duration of the distributed denial of service attack.
    Type: Grant
    Filed: October 18, 2021
    Date of Patent: June 13, 2023
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Ramanathan Ramanathan, Ajay K. Rentala, Rama Rao Yadlapalli, Vamsi K. Geda, Rameshchandra Bhaskar Ketharaju
  • Patent number: 11677763
    Abstract: Methods, computer-readable media, software, and apparatuses may assist in proactively warning a consumer they are a victim or possible target of a cyber-attack or cyber-threat. To discover whether a consumer may be a victim, the methods, computer-readable media, software, and apparatuses will monitor the Surface Web, Deep Web, and Dark Web for potential cyber-threats and cyber-attacks. If one is discovered, the methods, computer-readable media, software, and apparatuses will compare the criteria of victims of targeted in the cyber-attack and compare that criteria with consumer profiles. If a consumer profile matches the criteria, the methods, computer-readable media, software, and apparatuses will notify the consumer of the threat.
    Type: Grant
    Filed: January 14, 2021
    Date of Patent: June 13, 2023
    Assignee: ALLSTATE INSURANCE COMPANY
    Inventors: Jason D. Park, John S. Parkinson
  • Patent number: 11677768
    Abstract: Various embodiments of the present disclosure are directed to automatic improved network architecture generation. In this regard, embodiments may process data representing a network architecture to generate an improved network architecture that resolves one or more vulnerabilities associated with the network architecture.
    Type: Grant
    Filed: October 22, 2019
    Date of Patent: June 13, 2023
    Assignee: Honeywell International Inc.
    Inventors: Tarun Gupta, Anusha Challa, Chetan Siddapura Kallappa
  • Patent number: 11677777
    Abstract: Situational awareness and perimeter protection orchestration determines when network attacks are occurring, or predicts their occurrence, and provides tools and services to mitigate the attacks. The attacks can be denial of service attacks or distributed denial of service attacks or other types of attacks designed to disable and degrade a network. The dashboard can collect intelligence on what is happening on the network, and also streams of information from third parties that can be used to predict imminent network attacks. The dashboard can also determine what tools and services are available to the network operator in order to counteract the attacks.
    Type: Grant
    Filed: September 13, 2019
    Date of Patent: June 13, 2023
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Peter A. Makohon, Robert I. Kirby, Christopher Houser, Lawrence T. Belton, Jr., Terrence W. Gareau
  • Patent number: 11669779
    Abstract: Systems and methods include receiving a content item between a user device and a location on the Internet or an enterprise network; utilizing a trained machine learning ensemble model to determine whether the content item is malicious; responsive to the trained machine learning ensemble model determining the content item is malicious or determining the content item is benign but such determining is in a blind spot of the trained ensemble model, performing further processing on the content item; and, responsive to the trained machine learning ensemble model determining the content item is benign with such determination not in a blind spot of the trained machine learning ensemble model, allowing the content item. A blind spot is a location where the trained machine learning ensemble model has not seen any examples with a combination of features at the location or has examples with conflicting labels.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: June 6, 2023
    Assignee: Zscaler, Inc.
    Inventors: Dianhuan Lin, Rex Shang, Changsha Ma, Kevin Guo, Howie Xu
  • Patent number: 11671343
    Abstract: Techniques are disclosed relating to data discovery. A control program that is executing on a computer system may receiving a request to locate instances of data on a computer network having a plurality of computer systems that are managed by an orchestration program. The control program may perform multiple, limited-time-period deployments of a sniffer program to different portions of the computer network in order to sample network traffic from the different portions to determine whether instances of the data appear in the network traffic. The control program may receive, from the sniffer program, information that identifies one or more of the different portions of the computer network whose network traffic included instances of the data.
    Type: Grant
    Filed: February 25, 2021
    Date of Patent: June 6, 2023
    Assignee: Helios Data Inc.
    Inventors: Yi Sun, Fei Zou
  • Patent number: 11663334
    Abstract: Systems and methods for data augmentation used in training an anti-malware (AM) machine learning model are provided herein. In some embodiments, a method for data augmentation may include receiving a first plurality of binary files each having a first binary structure, wherein the first plurality of binary files include one or more known malicious and benign files; modifying the binary structure of each of the first plurality of binary files to produce a second plurality of binary files each having a second binary structure that is different from the first binary structure; using the first and second plurality of binary files to train an AM machine learning model as to which files are malicious and which files are benign; and using the trained AM machine learning model to identify new malicious files.
    Type: Grant
    Filed: April 25, 2022
    Date of Patent: May 30, 2023
    Assignee: UAB 360 IT
    Inventors: Mantas Briliauskas, Aleksandr {hacek over (S)}ev{hacek over (c)}enko
  • Patent number: 11665179
    Abstract: A threat detection method includes: obtaining packets in a Transmission Control Protocol (TCP) session between a first device and a second device; obtaining a first data flow transmitted from the first device and a second data flow transmitted from the second device in the TCP session; obtaining time information of each of a plurality of first packets in the first data flow and time information of each of a plurality of second packets in the second data flow; calculating an activation rate, a response rate, and a quantity of interactions based on the time information; and if the activation rate is greater than or equal to a first threshold, the response rate is greater than or equal to a second threshold, and the quantity of interactions is greater than or equal to a third threshold, determining that the first device is threatened.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: May 30, 2023
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Wenhui Xie
  • Patent number: 11663333
    Abstract: An exemplary method includes: obtaining, at one or more cloud servers, endpoint data of an endpoint computing device; based on the endpoint data, determining, by the one or more cloud servers, a plurality of script-language rules, wherein: each of the plurality of script-language rules corresponds to an atomic operation of detecting and/or removing at least one rootkit, the at least one rootkit comprises a target rootkit, and the plurality of script-language rules comprise a set of one or more rootkit rules corresponding to the target rootkit; and transmitting, by the one or more cloud servers to the endpoint computing device, the plurality of script-language rules, wherein the set of rootkit rules is executable at the endpoint computing device to detect and/or remove the target rootkit by, for each of the set of rootkit rules, executing a corresponding atomic operation.
    Type: Grant
    Filed: August 11, 2020
    Date of Patent: May 30, 2023
    Assignee: Beijing DiDi Infinity Technology and Development Co., Ltd.
    Inventor: Yu Wang
  • Patent number: 11658995
    Abstract: Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that identify when a domain name identifier in a received request matches one of a plurality of domain names stored in a whitelist domain name storage. When the identification indicates the received domain name identifier fails to match one of the plurality of domain names stored in the whitelist domain name storage, then a determination is made on whether the received request is a suspicious request. Another storage is updated when the determination indicates the received request is the suspicious request or otherwise updating the received request as a valid request.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: May 23, 2023
    Assignee: F5, Inc.
    Inventors: Judge Kennedy Singh Arora, Sandeep Agarwal, Nitesh Soni, Ravneet S. Dhaliwal
  • Patent number: 11657317
    Abstract: Under one aspect, a computer-implemented method includes receiving a query at a query interface about whether a computer file comprises malicious code. It is determined, using at least one machine learning sub model corresponding to a type of the computer file, whether the computer file comprises malicious code. Data characterizing the determination are provided to the query interface. Generating the sub model includes receiving computer files at a collection interface. Multiple sub populations of the computer files are generated based on respective types of the computer files, and random training and testing sets are generated from each of the sub populations. At least one sub model for each random training set is generated.
    Type: Grant
    Filed: October 20, 2017
    Date of Patent: May 23, 2023
    Assignee: Cylance Inc.
    Inventors: Ryan Permeh, Stuart McClure, Matthew Wolff, Gary Golomb, Derek A. Soeder, Seagen Levites, Michael O'Dea, Gabriel Acevedo, Glenn Chisholm
  • Patent number: 11659000
    Abstract: Mechanisms, which can include systems, method, and media, for protecting network devices from malicious rich text format (RTF) files are provided, the mechanisms comprising: intercepting an RTF file destined for a network device; parsing the RTF file to identify a plurality of objects in the RTF file; checking a first object of the plurality of objects for a first heuristic; based upon an outcome of the checking of the first object for the first heuristic, increasing a cumulative weight by a first weight value; comparing the cumulative weight against at least one threshold to classify the RTF file; and based on the classification of the RTF file, taking a protective action on the RTF file.
    Type: Grant
    Filed: November 20, 2020
    Date of Patent: May 23, 2023
    Assignee: McAfee, LLC
    Inventor: Chintan Shah
  • Patent number: 11658999
    Abstract: A cybersecurity system and method for handling a cybersecurity event includes identifying a cybersecurity alert; selectively initializing automated threat intelligence workflows based on computing a cybersecurity alert type, wherein the automated threat intelligence workflows include a plurality of automated investigative tasks that, when executed by one or more computers, derive cybersecurity alert intelligence data; and executing the plurality of automated investigative tasks includes automatically sourcing a corpus of investigative data; deriving the cybersecurity alert intelligence data based on extracting selective pieces of data from the corpus of investigative data, wherein the cybersecurity alert intelligence data informs an inference of a cybersecurity alert severity of the cybersecurity alert; and automatically routing the cybersecurity alert to one of a plurality of distinct threat mitigation or threat disposal routes based on the cybersecurity alert severity of the cybersecurity alert.
    Type: Grant
    Filed: February 15, 2022
    Date of Patent: May 23, 2023
    Assignee: Expel, Inc.
    Inventors: Matt Peters, Peter Silberman, Dan Whalen, Elisabeth Weber, Jon Hencinski, John Begeman
  • Patent number: 11657152
    Abstract: A security engine may use event-stream processing and behavioral techniques to detect ransomware. The engine may detect process behavior associated with encrypting a file, encrypting a storage device, or disabling a backup file, and may assign a ransomware category to the process based thereon. The engine may initiate protection actions to protect system resources from the process, which may continue to execute. The engine may monitor the process for specific behavior corresponding to its ransomware category. Based on the extent to which such specific behavior is detected, the engine may determine that the process is not ransomware, assign a ransomware subcategory to the process, or adjust the process's threat score. Monitoring of the process may continue, and the threat score may be updated based on the process's behavior. If the threat score exceeds a threshold corresponding to the ransomware category (or subcategory), a corresponding policy action may be initiated.
    Type: Grant
    Filed: April 16, 2021
    Date of Patent: May 23, 2023
    Assignee: VMWare, Inc.
    Inventors: Jeffrey Albin Kraemer, Adam Karol Malinowski
  • Patent number: 11657149
    Abstract: Examples of the present disclosure describe systems and methods for a behavioral threat detection virtual machine. In examples, the virtual machine executes a rule comprising rule instructions. A rule may comprise one or more wait rule instructions that causes the virtual machine to pause execution. As events are added to an event queue for the rule virtual machine, the behavioral threat detection virtual machine evaluates such events in order to identify a positive or, in some instances, a negative match. When a matching event is identified, rule execution resumes. Eventually, a determination is made as a result of processing events and wait packets, thereby indicating the presence or absence of a malicious or potentially malicious behavior, among other examples. Thus, among other things, the behavioral threat detection virtual machine maintains a state associated with rule execution and processes events to identify behaviors accordingly.
    Type: Grant
    Filed: June 11, 2021
    Date of Patent: May 23, 2023
    Assignee: WEBROOT INC.
    Inventors: Eric Klonowski, Fred Krenson
  • Patent number: 11658993
    Abstract: Described embodiments provide systems and methods for traffic inspection via embedded browsers. An application inspector module of an embedded browser executable on a client may intercept network traffic for an application. The network traffic may include packets exchanged between the application and the server via a channel. The application inspector module may identify a computing resource usage on the client in providing a user with access to the application via the embedded browser. The application inspector module may generate analytics data based on the intercepted network traffic and the computing resource usage. The application inspector module may maintain a user behavior profile based on the analytics data. The application inspector module may determine that a portion of the network traffic directed to the remote server contains sensitive information. Responsive to the determination, the application inspector module may block or remove the portion of the network traffic.
    Type: Grant
    Filed: January 10, 2022
    Date of Patent: May 23, 2023
    Inventors: Alexandr Smelov, Christopher Fleck
  • Patent number: 11659396
    Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.
    Type: Grant
    Filed: November 18, 2022
    Date of Patent: May 23, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Venson Shaw, Sunil Lingayat
  • Patent number: 11652833
    Abstract: An indication of a security alert and a context for the security alert is received. The context includes one or more entities related to the context and a timestamp for the security alert. Data sources for the one or more entities are searched during a time window around the timestamp. One or more anomaly detection models are executed to identify anomalies that are related to the security alert based on the context. Identified anomalies for investigation of the security alert are output.
    Type: Grant
    Filed: July 24, 2020
    Date of Patent: May 16, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Hani Hana Neuvirth, Dawn A. Burns, Andrey Karpovsky, Yotam Livny
  • Patent number: 11651072
    Abstract: A system for identifying missing organizational security detection system rules, the system includes at least one processing circuitry configured to provide a known cyber-attack techniques repository including information of known cyber-attack techniques and required SIEM (or any other organizational security detection system such as EDR, firewall, etc.) rules required for protecting against each of the known cyber-attack techniques, the known rules being in a generic SIEM rules format; obtain existing SIEM rules of a SIEM of an organization, the existing SIEM rules being in a vendor-specific language, other than the generic SIEM rules format; translate the existing SIEM rules to the generic SIEM rules format, using a translation system, giving rise to translated SIEM rules; compare the translated SIEM rules to the required SIEM rules to identify missing rules, being the required SIEM rules not included in the translated SIEM rules.
    Type: Grant
    Filed: February 23, 2021
    Date of Patent: May 16, 2023
    Assignee: CyberProof Israel Ltd.
    Inventors: Eran Alshech, Adam Amram
  • Patent number: 11651070
    Abstract: Provided are a computer program product, system, and method for detecting a security breach in a system managing access to a storage. Process Input/Output (I/O) activity by a process accessing data in a storage is monitored. A determination is made of a characteristic of the data subject to the I/O activity from the process. A determination is made as to whether a characteristic of the process I/O activity as compared to the characteristic of the data satisfies a condition. The process initiating the I/O activity is characterized as a suspicious process in response to determining that the condition is satisfied. A security breach is indicated in response to characterizing the process as the suspicious process.
    Type: Grant
    Filed: September 17, 2021
    Date of Patent: May 16, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthew G. Borlick, Lokesh M. Gupta
  • Patent number: 11652714
    Abstract: Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). Two or more network segments coupled by a traffic forwarding device (TFD) may be monitored. External network addresses and internal network addresses may be determined based on encrypted network traffic exchanged between external endpoints and the TFD and internal network traffic exchanged between internal endpoints and the TFD. Metrics associated with the external network addresses or the internal network addresses may be determined based on the monitoring. Correlation scores may be provided for the external network addresses and the internal network addresses based on of a correlation model, the metrics, or the other metrics. If a correlation score associated with an external network address and an internal network address exceeds a threshold value, the external network address and the internal network address may be associated with each other based on the correlation score.
    Type: Grant
    Filed: July 11, 2022
    Date of Patent: May 16, 2023
    Assignee: ExtraHop Networks, Inc.
    Inventors: Xue Jun Wu, Arindum Mukerji, Jeff James Costlow, Michael Kerber Krause Montague, Jesse Abraham Rothstein, Matthew Alexander Schurr
  • Patent number: 11645427
    Abstract: A system includes a device including one or more sensors that generate one or more signals used to detect whether an unauthorized activity has occurred at the device. The device is configured to transmit the one or more signals generated by the one or more sensors. The central monitoring device is configured to receive the one or more signals and compare the one or more signals with a baseline signal for the device. The baseline signal includes an expected signal for each of the one or more sensors when the unauthorized activity has not occurred. The monitoring device determines whether the unauthorized activity has occurred based on a result of the comparison.
    Type: Grant
    Filed: November 29, 2020
    Date of Patent: May 9, 2023
    Assignee: Bank of America Corporation
    Inventors: Michael R. Young, Daniel J August, Tomas M. Castrejon, III, Richard Martin Seymour Scot, Neal Aaron Slensker
  • Patent number: 11647034
    Abstract: Enriched access data supports anomaly detection to enhance network cybersecurity. Network access data is enriched using service nodes representing resource provision and other services, with geolocation nodes representing grouped access origins, and access values representing access legitimacy confidence. Data enrichment provides a trained model by mapping IP addresses to geolocations, building a bipartite access graph whose inter-node links indicate aspects of accesses from geolocations to services, and generating semantic vectors from the graph. Vector generation may include collaborative filtering, autoencoding, neural net embedding, and other machine learning tools and techniques. Anomaly detection systems then calculate service-geolocation or geolocation-geolocation vector distances with anomaly candidate vectors and the model's graph-based vectors, and treat distances past a threshold as anomaly indicators.
    Type: Grant
    Filed: September 12, 2020
    Date of Patent: May 9, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Roy Levin, Andrey Karpovsky
  • Patent number: 11647029
    Abstract: A method of probing and responding to a security breach in a computer network security system includes defining first and second rules and defining a model to output a probability that a security breach has occurred based on an input and to generate commands. Data is collected at first nodes according to the first rules and a first portion of the collected data is selected and sent from the first nodes to a second node. The selected first portion is input into the model to obtain an output probability that a security breach has occurred and the following steps are performed: determining signs of a security breach, generating a first command with the model to cause a second portion of the collected data to be selected, and generating a second command with the model to cause a change in settings at one or more of the first nodes.
    Type: Grant
    Filed: December 7, 2018
    Date of Patent: May 9, 2023
    Assignee: Withsecure Corporation
    Inventors: Paolo Palumbo, Dmitry Komashinskiy, Szymon Grzybowski
  • Patent number: 11647355
    Abstract: Implementations described and claimed herein provide systems and methods for correlating one or more service areas of a network with one or more geolocation coordinates to determine available services for customers to the network. A service polygon may be generated that define an area in which a particular service offered by a communications network is available. The boundaries of the service polygons may be adjusted based on information corresponding to physical features of the initial area. The service polygons may aid a communications network in providing a list of available services to potential customers or devices connected to the network by determining one or more geolocation coordinate values of a potential connection site and comparing the values to the service polygons. A network management system may determine the available services, current or in the future, to offer such services to a customer to the network.
    Type: Grant
    Filed: March 18, 2022
    Date of Patent: May 9, 2023
    Assignee: Level 3 Communications, LLC
    Inventors: Shawn Draper, Vamsi Kaza, Jerry Matthews, William Gray
  • Patent number: 11647043
    Abstract: Systems, methods, and software described herein provide for identifying and implementing security actions within a computing environment. In one example, a method of operating an advisement system to provide security actions in a computing environment includes identifying communication interactions between a plurality of computing assets and, after identifying the communication interactions, identifying a security incident in a first computing asset. The method further provides identifying at least one related computing asset to the first asset based on the communication interactions, and determining the security actions to be taken in the first computing asset and the related computing asset.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: May 9, 2023
    Assignee: Splunk Inc.
    Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
  • Patent number: 11641368
    Abstract: Systems and methods are disclosed for automatically predicting a risk score of a user login attempt by receiving a user login attempt and generating a login feature vector associated with the user login attempt. The systems and methods further train a machine learning technique to establish a relationship between the login feature vector and the risk score. The trained machine learning technique is applied to new user login attempts to predict a risk score associated with the login attempt and issue an authentication challenge to the user if the risk score exceeds a predetermined threshold value.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: May 2, 2023
    Assignee: Snap Inc.
    Inventors: Neil Shah, Mingyi Zhao, Yu-Hsin Chen
  • Patent number: 11641343
    Abstract: The invention concerns API proxy based adaptive security. The invention implements adaptive security for API servers, while avoiding data bottlenecks and maintaining client experience. The invention provides methods and configurations for API security that may be employed at proxies for implementing routing decisions involving client messages received at said proxies. The invention also involves generating or collecting at proxies, log information that captures data corresponding to received client messages and responses from API servers—which log information correlates communications between clients, proxies and backend API servers, and includes data relevant for purposes generating API metrics and identifying anomalies and/or indicators of compromise.
    Type: Grant
    Filed: May 22, 2020
    Date of Patent: May 2, 2023
    Assignee: Ping Identity Corporation
    Inventors: Udayakumar Subbarayan, Bernard Harguindeguy, Anoop Krishnan Gopalakrishnan, Abdu Raheem Poonthiruthi
  • Patent number: 11641366
    Abstract: An apparatus includes a memory and a processor. The memory stores a first list of applications that includes a first application and a second list of applications that includes a second application. Each application of the first list is assigned to a first trust level, indicating that a probability that the application is malicious is less than a lower threshold. Each application of the second list is assigned to a second trust level, indicating that a probability that the application is malicious is greater than the lower threshold. The processor determines that the second application transmitted a communication destined for the first application, and that the first and second applications are assigned to different trust levels. In response, the processor determines that a probability that the transmitted communication is malicious is greater than a threshold and prevents the communication from reaching the computer system of the first application.
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: May 2, 2023
    Assignee: Bank of America Corporation
    Inventor: Maharaj Mukherjee
  • Patent number: 11640464
    Abstract: The present disclosure describes a firmware analysis system and method that can generate a collection of protocol constraints from known firmware and apply the collection of protocol constraints towards an unknown firm to recognize protocol relevant fields and detect functionality within the unknown firmware.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: May 2, 2023
    Assignee: University of Florida Research Foundation, Inc.
    Inventors: Tuba Yavuz, Farhaan Fowze, Kevin Raymond Boyce Butler, Jing Tian, Grant Haydock Hernandez
  • Patent number: 11640545
    Abstract: In order to facilitate the entity resolution and entity activity tracking and indexing, systems and methods include receiving first source records from a first database and second source records from a record database. A candidate set of second source records is determined by a heuristic search in the set of second source records. A candidate pair feature vector associated with each candidate pair of first and second source records is generated. An entity matching machine learning model predicts matching first source records for each candidate second source record based on the respective candidate pair feature vector. An aggregate quantity associated with the matching first source records is aggregated from a quantity associated with each first source record, and a quantity index for each candidate second source record is determined based the aggregate quantities. Each quantity index is displayed to a user.
    Type: Grant
    Filed: November 15, 2021
    Date of Patent: May 2, 2023
    Assignee: Capital One Services, LLC
    Inventors: Tanveer Faruquie, Aman Jain, Jihan Wei, Amir Reza Rahmani, Christopher Johnson
  • Patent number: 11641372
    Abstract: Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: May 2, 2023
    Assignee: Splunk Inc.
    Inventors: Vijay Chauhan, Cary Noel, Wenhui Yu, Luke Murphey, Alexander Raitz, David Hazekamp
  • Patent number: 11641583
    Abstract: A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.
    Type: Grant
    Filed: September 10, 2021
    Date of Patent: May 2, 2023
    Assignee: Lookout, Inc.
    Inventors: Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal, Cherry Mangat, Brian James Buck, William Robinson
  • Patent number: 11637858
    Abstract: Features are extracted from an artifact so that a vector can be populated. The vector is then inputted into an anomaly detection model comprising a deep generative model to generate a first score. The first score can characterize the artifact as being malicious or benign to access, execute, or continue to execute. In addition, the vector is inputted into a machine learning-based classification model to generate a second score. The second score can also characterize the artifact as being malicious or benign to access, execute, or continue to execute. The second score is then modified based on the first score to result in a final score. The final score can then be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: April 25, 2023
    Assignee: Cylance Inc.
    Inventor: Michael Thomas Wojnowicz
  • Patent number: 11636214
    Abstract: A technique includes an operating system agent of a computer system monitoring a process to detect whether an integrity of the process has been compromised. The monitoring includes the operating system agent scanning a data structure. The process executes in a user space, and the data structure is part of an operating system kernel space. The technique includes a hardware controller of the computer system listening for a heartbeat that is generated by the operating system agent. The hardware controller takes a corrective action in response to at least one of the hardware controller detecting an interruption of the heartbeat, or the operating system agent communicating to the hardware controller a security alert for the process.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: April 25, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Geoffrey Ndu, Nigel John Edwards
  • Patent number: 11637845
    Abstract: A malicious attack detection method includes receiving, by a controller, a packet-in message sent by a switch, sending, by the controller, an abnormal flow entry to the switch, receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered, and determining, according to the triggering count, whether a malicious attack is initiated.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: April 25, 2023
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Ke Lin, Yongcan Wang, Yingjun Tian
  • Patent number: 11637841
    Abstract: Techniques are disclosed relating to reporting for network events within a computer network. A computer system may access a set of data corresponding to a particular network event within a computer network, where the set of data includes captured attributes of the particular network event. The computer system may then calculate, using the set of data, a security score indicative of suspiciousness of the event and an actionability score that is based on an extent to which of a particular group of attributes are missing from the set of data. The computer system may determine, based on the two scores, a combined score for the event. The computer system may then report a notification for the event, based on the combined score. Such techniques may decrease a number of reported events for a network, which may advantageously allow resources to be focused on a smaller set of events.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: April 25, 2023
    Inventors: John Seymour, Anuj Gargeya Malkapuram, Prashant Dwarkadas Agrawal
  • Patent number: 11636198
    Abstract: An electronic device for receiving and seamlessly providing cybersecurity analyzer updates and concurrent management systems for detecting cybersecurity threats including a processor and a memory communicatively coupled to the processor. The memory stores an analyzer logic to generate a first analyzer configured to receive a suspicious object for threat evaluation, an inspection logic to manage a first queue of suspicious objects for threat evaluation to the first analyzer, and an update logic to receive updated cybersecurity analytics content data. The analyzer logic receives updated cybersecurity analytics content data and can generate a second analyzer that incorporates at least a portion of the parsed updated cybersecurity analytics content data.
    Type: Grant
    Filed: February 20, 2020
    Date of Patent: April 25, 2023
    Assignee: FireEye Security Holdings US LLC
    Inventors: Neeraj Kulkarni, Robert M. Beard, Jr., Robin Caron
  • Patent number: 11632392
    Abstract: As described, a cloud-based enrollment service is configured to advertise features and capabilities of clusters performing malware analyses within a cloud-based malware detection system. Upon receiving an enrollment request message, including tenant credentials associated with a sensor having an object to be analyzed for malware, the cloud-based enrollment service is configured to use the tenant credentials to authenticate the sensor and determine a type of subscription assigned to the sensor. Thereafter, the cloud-based enrollment service is further configured to transmit an enrollment response message including a portion of the advertised features and capabilities of a selected cluster of the cloud-based malware detection system. The advertised features and capabilities includes information to enable the sensor to establish direct communications with the selected cluster.
    Type: Grant
    Filed: April 6, 2020
    Date of Patent: April 18, 2023
    Assignee: FireEye Security Holdings US LLC
    Inventor: Alexander Otvagin
  • Patent number: 11630902
    Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a plurality of security related activities, the plurality of security related activities being based upon observables from an electronic data source; analyzing the plurality of security related activities, the analyzing identifying a set of entity behaviors associated with the plurality of security related activities; and, performing a security operation via a security system, the security operation accessing entity behavior catalog data stored within an entity behavior catalog based upon the set of entity behaviors associated with the plurality of security related activities, the entity behavior catalog providing an inventory of entity behaviors for use when performing the security operation.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: April 18, 2023
    Assignee: Forcepoint LLC
    Inventors: Alan Ross, Raffael Marty, Margaret Cunningham, Ruchika Pandey
  • Patent number: 11630895
    Abstract: Disclosed herein are systems and methods for changing a password of an account record under a threat of unlawful access to user data. In one aspect, an exemplary method comprises generating, by an account records generator, a set of known user account records and sending the generated set of known user account records to a determination module, identifying, by the determination module, a use of at least one user account record from the generated set, and sending, to a verification module, data about the at least one user account record, performing, by the verification module, a verification of a presence of a threat of unlawful access to user data, the unlawful access being performed using the at least one user account record and performing, by a change module, the changing of a password of the at least one user account record the use of which has been identified.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: April 18, 2023
    Assignee: AO Kaspersky Lab
    Inventors: Sergey A. Sidorov, Mikhail S. Chebakov, Irina V. Ermilova
  • Patent number: 11632383
    Abstract: In some implementations, sequences of time series values determined from machine data are obtained. Each sequence corresponds to a respective time series. A plurality of predictive models is generated for a first time series from the sequences of time series values. Each predictive model is to generate predicted values associated with the first time series using values of a second time series. For each of the plurality of predictive models, an error is determined between the corresponding predicted values and values associated with the first time series. A predictive model is selected for anomaly detection based on the determined error of the predictive model. Transmission is caused of an indication of an anomaly detected using the selected predictive model.
    Type: Grant
    Filed: October 21, 2020
    Date of Patent: April 18, 2023
    Assignee: Splunk Inc.
    Inventors: Adam Jamison Oliner, Jonathan La, Colleen Kinross, Hongyang Zhang, Jacob Leverich, Shang Cai, Mihai Ganea, Alex Cruise, Toufic Boubez, Manish Sainani
  • Patent number: 11632381
    Abstract: An information processing device includes a malicious message detector and an outputter. The malicious message detector detects a malicious message in a network based on an SA included in a claim message received from the network, a period that is based on a time at which the claim message is received, and a message received from the network before or after the claim message. The outputter outputs a detection result of the malicious message detector.
    Type: Grant
    Filed: August 17, 2020
    Date of Patent: April 18, 2023
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventors: Takayuki Fujii, Toshihisa Nakano
  • Patent number: 11625482
    Abstract: A computer security monitoring system and method are disclosed that feature, in one general aspect, monitoring on an ongoing basis for evidence of the presence of infected systems in one or more networks that are each associated with a monitored organizational entity possessing digital assets, continuously updating risk profiles for the entities based on information about intrusion features from the monitoring, aggregating risk scores for the entities, and electronically reporting the aggregated risk score to an end user. In another general aspect, a method is disclosed that includes acquiring and storing data relating to interactions with malware controllers over a public network, acquiring and storing a map of relationships between networks connected to the public network, extracting risk data from the stored interaction data and the stored relationship map by cross-referencing the acquired interaction data against the map of relationships, and issuing security alerts based the extracted risk data.
    Type: Grant
    Filed: March 18, 2020
    Date of Patent: April 11, 2023
    Assignee: Recorded Future, Inc.
    Inventors: Christopher Ahlberg, Bill Ladd, Sanil Chohan, Adrian Tirados Mata, Michael Tran, Staffan Truvé